{"id":688,"date":"2012-12-05T10:02:53","date_gmt":"2012-12-05T15:02:53","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=688"},"modified":"2013-05-20T13:44:49","modified_gmt":"2013-05-20T17:44:49","slug":"protecting-your-data-in-customs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/protecting-your-data-in-customs\/688\/","title":{"rendered":"Protecting Your Data in Customs"},"content":{"rendered":"<p>U.S. customs officials are increasingly interested in the data stored on mobile devices and laptops. For international travelers who have sensitive data on their phones (we mean corporate folks, not spies), the <a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener nofollow\">Electronic Frontier Foundation<\/a> has these helpful tips to get your mobile device through customs safely and to keep the data stored on it secure should it be seized in customs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-690\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2012\/12\/05101122\/customs.jpg\" alt=\"customs\" width=\"600\" height=\"268\"><\/p>\n<ol>\n<li><strong>Know Who You\u2019re Dealing With<\/strong>: This is serious stuff. Unless you want to face an indefinite detention, cooperate fully and don\u2019t lie to border agents. If an agent intends to examine your device, remember that only a judge can require you to give up a passphrase, and if there are questions you don\u2019t want to answer you can refuse to answer them. If your devices are confiscated, take down the agent\u2019s identifying information and get a receipt for your property.<\/li>\n<li><strong>Know Your At-Risk Devices<\/strong>: Any device that stores data is subject to search and seizure \u2013 this means laptops, phones, tablets, mp3 players, cameras, hard drives and, well, you get the picture. Customs and Border Protection or Immigration and Customs Enforcement (ICE) agents only conduct such these types of searches around 300 times a month, so the likelihood it will happen to you is quite low \u2013 but it\u2019s still a possibility.<\/li>\n<li><strong>Use Encryption<\/strong>: Government agents can easily decipher passwords or can avoid them altogether by booting your device from a CD or USB device. The solution? Full-disk encryption and strong passphrases; using these techniques ensures that a border agent can access your data only with your consent while also protecting your device if it is lost or stolen.<\/li>\n<li><strong>Deep Delete Data<\/strong>: One way to protect data on a particular device is to copy it to an external hard drive, then delete it from the original device. But simply deleting content and emptying out your system\u2019s desktop trash can won\u2019t cut it \u2013 use a data destruction tool to remove and overwrite the data.<\/li>\n<li><strong>Snail Mail<\/strong>: There is one surefire way to make sure border agents can\u2019t search your devices but still have access to them when you arrive at your foreign destination \u2013 mail them to yourself. You\u2019ll skip any uncomfortable encounters in customs, but keep in mind there are no privacy guarantees for data sent in the mail.<\/li>\n<li><strong>Snail Mail the Hard Drive<\/strong>: If you don\u2019t want to part with your device of choice during your trip but want to protect and access the data when you arrive where you\u2019re going, send the hard drive to your destination by mail \u2013 or pack it in your checked luggage.<\/li>\n<li><strong>Snail Mail the Data<\/strong>: Much like the previous suggestion, the postal service can work its old-fashioned magic for you yet again if you back up your data on an external device (think a hard drive, a USB drive or an SD card), fully delete the data from your device and ship the backup storage to your destination.<\/li>\n<li><strong>Cloud Protection<\/strong>: There are an increasing number of secure, web-based storage systems that can do the trick for you. Copy your sensitive data to one of these sites before your trip \u2013 making sure both the system you\u2019re using and your data are encrypted \u2013 and then simply download it upon arrival. Simple as that.<\/li>\n<li><strong>Kick it Old School<\/strong>: If you\u2019re really worried about getting your data snatched at customs or just don\u2019t want to deal with the headache, remember that people travelled for business for a long time without BlackBerry devices, laptops and hard drives. Use a land line or a mobile phone you buy at your destination and remember that even James Bond never used an iPhone.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>U.S. customs officials are increasingly interested in the data stored on mobile devices and laptops. For international travelers who have sensitive data on their phones (we mean corporate folks, not<\/p>\n","protected":false},"author":32,"featured_media":694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[188,191,192,97],"class_list":{"0":"post-688","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-customs","9":"tag-data","10":"tag-protection","11":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protecting-your-data-in-customs\/688\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protecting-your-data-in-customs\/688\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protecting-your-data-in-customs\/688\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protecting-your-data-in-customs\/688\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting-your-data-in-customs\/688\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/protecting-your-data-in-customs\/432\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting-your-data-in-customs\/688\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting-your-data-in-customs\/688\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/customs\/","name":"customs"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=688"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/688\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/694"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}